<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lenders-core-dnr-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="CoRE DNR">Discovery of Network-designated OSCORE-based Resolvers: Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-lenders-core-dnr-02"/>
    <author fullname="Martine Sophie Lenders">
      <organization abbrev="TU Dresden">TUD Dresden University of Technology</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>martine.lenders@tu-dresden.de</email>
      </address>
    </author>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author fullname="Thomas C. Schmidt">
      <organization>HAW Hamburg</organization>
      <address>
        <email>t.schmidt@haw-hamburg.de</email>
      </address>
    </author>
    <author initials="M." surname="Wählisch" fullname="Matthias Wählisch">
      <organization abbrev="TU Dresden &amp; Barkhausen Institut">TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
      <address>
        <postal>
          <street>Helmholtzstr. 10</street>
          <city>Dresden</city>
          <code>D-01069</code>
          <country>Germany</country>
        </postal>
        <email>m.waehlisch@tu-dresden.de</email>
      </address>
    </author>
    <date year="2024" month="June" day="29"/>
    <area>Web and Internet Transport</area>
    <workgroup>Constrained RESTful Environments</workgroup>
    <keyword>CoRE</keyword>
    <keyword>CoAP</keyword>
    <keyword>DoC</keyword>
    <keyword>DNR</keyword>
    <keyword>SVCB</keyword>
    <abstract>
      <?line 81?>

<t>This document states problems when designing DNS SVCB records to discover endpoints that communicate over
Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/>.
As a consequence of learning about OSCORE, this discovery will allow a host to learn both CoAP servers and DNS over CoAP resolvers that use OSCORE to encrypt messages and Ephemeral Diffie-Hellman Over COSE (EDHOC) <xref target="RFC9528"/> for key exchange.
Challenges arise because SVCB records are not meant to be used to exchange security contexts, which is required in OSCORE scenarios.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://anr-bmbf-pivot.github.io/draft-lenders-core-dnr/draft-lenders-core-dnr.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lenders-core-dnr/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Constrained RESTful Environments Working Group mailing list (<eref target="mailto:core@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/core/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/anr-bmbf-pivot/draft-lenders-core-dnr"/>.</t>
    </note>
  </front>
  <middle>
    <?line 88?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The discovery of Internet services can be facilitated by the Domain Name System (DNS).
To discover services of the constrained Internet of Things (IoT) using the DNS, two challenges must be solved.
First, the discovery of a DNS resolver that supports DNS resolution based on secure, IoT-friendly protocols—otherwise the subsequent discovery of IoT-tailored services would be limited to resolution protocols conflicting with constrained resources.
Second, the discovery of an IoT-friendly service beyond the DNS resolution.</t>
      <t><xref target="RFC9460"/> specifies the "SVCB" ("Service Binding") DNS resource record to lookup information needed to connect to a network service. Service Parameters (SvcParams) carry
that information within the SVCB record.</t>
      <t>The discovery of DNS resolvers can be enabled by the DNS itself <xref target="RFC9461"/>, <xref target="RFC9462"/> or, in a local network, by Router Advertisements and DHCP <xref target="RFC9463"/>.
In all theses cases, the SvcParams is used, but supports only DNS transfer based on Transport Layer Security (TLS), namely DNS over TLS (DoT) <xref target="RFC7858"/>, DNS over HTTPS (DoH) <xref target="RFC8484"/>, and DNS over Dedicated QUIC (DoQ) <xref target="RFC9250"/>.
The use of DoT, DoH, or DoQ, however, is not recommended in IoT scenarios.</t>
      <t>DNS over CoAP <xref target="I-D.ietf-core-dns-over-coap"/> provides a solution for encrypted DNS in constrained environments.
The Constrained Application Protocol (CoAP) <xref target="RFC7252"/> is mostly agnostic to the transport layer CoAP can be transported over UDP, TCP, or WebSockets <xref target="RFC8323"/>, and even less common transports such as Bluetooth GATT <xref target="I-D.amsuess-core-coap-over-gatt"/> or SMS <xref target="lwm2m"/> are discussed.
<xref target="I-D.ietf-core-transport-indication"/> will cover the selection of different CoAP transports using SVCB records in a future version.</t>
      <t>CoAP offers three security modes:</t>
      <ul spacing="normal">
        <li>
          <t><strong>No Security:</strong> This plain CoAP mode does not support any encryption. It
is not recommended when using <xref target="I-D.ietf-core-dns-over-coap"/> but inherits core CoAP features
such as block-wise transfer <xref target="RFC7959"/> for datagram-based
segmentation.  Such features are beneficial in constrained settings even
without encryption.</t>
        </li>
        <li>
          <t><strong>Transport Security:</strong> CoAP may use DTLS when transferred over UDP <xref target="RFC7252"/> and TLS when transferred over TCP <xref target="RFC8323"/>.</t>
        </li>
        <li>
          <t><strong>Object Security:</strong> Securing content objects can be achieved using
OSCORE <xref target="RFC8613"/>. OSCORE can be used either as an alternative or in
addition to transport security.  </t>
          <t>
OSCORE keys have a limited lifetime and need to be set up.
Keys can be received from an ACE Authorization Server (AS), as described in the ACE OSCORE profile <xref target="RFC9203"/>, or, alternatively to support "zero-touch", through an EDHOC key exchange <xref target="RFC9528"/>, as described in the ACE EDHOC profile <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
        </li>
      </ul>
      <t>The SVCB-based discovery of a CoAP service in mode "no security" is covered in <xref target="I-D.ietf-core-transport-indication"/>, and a CoAP service in the mode "transport security" in <xref target="I-D.lenders-core-coap-dtls-svcb"/>.
The discovery of CoAP services in mode "object security" is not specified.
To guide future specifications, this document clarifies aspects when using SVCB in the context of CoAP and object security.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The terms "DoC server" and "DoC client" are used as defined in <xref target="I-D.ietf-core-dns-over-coap"/>.</t>
      <t>The terms "constrained node" and "constrained network" are used as defined in <xref target="RFC7228"/>.</t>
      <t>SvcParams denotes the field in either DNS SVCB/HTTPS records as defined in <xref target="RFC9460"/>, or DHCP and RA
messages as defined in <xref target="RFC9463"/>. SvcParamKeys are used as defined in <xref target="RFC9460"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="problem-space">
      <name>Problem Space</name>
      <t>The first and most important point of discussion for the discoverability of CoAP is if and what
new SvcParamKeys need to be defined and what is already there.</t>
      <t><xref target="RFC9460"/> defines the "alpn" key, which is used to identify the protocol suite of a service binding
using its Application-Layer Protocol Negotiation (ALPN) ID <xref target="RFC7301"/>. While this is useful to
identify classic transport layer security, the question is raised if this is needed or even helpful
for when there is only object security. There is an ALPN ID for CoAP over TLS that is defined in
<xref target="RFC8323"/>. As using the same ALPN ID for different transport layers is not recommended, another
ALPN ID for CoAP over DTLS is introduced in <xref target="I-D.lenders-core-coap-dtls-svcb"/>. Object security may be
selected in addition to transport layer security or without it. Additionally, different
CoAP transports can be selected, which may be orthogonal to the transport security.
For instance, DTLS can be used over transports other than UDP. The selection of CoAP transport
protocols will be covered in future versions of <xref target="I-D.ietf-core-transport-indication"/>. Defining an ALPN ID for each
combination of object security, mode of transport layer security, and transport protocol might not
be viable or scalable. For some ways of setting up object security, additional information is
needed, such as an establishment options for an encryption context with EDHOC or an authentication
server (AS) with ACE.</t>
      <t>Beyond the SvcParamKeys, there is the question of what the field values of the Encrypted DNS Options
defined in <xref target="RFC9463"/> might be with EDHOC or ACE EDHOC. While most fields map,
"authentication-domain-name" (ADN) and its corresponding ADN length field may not matter
when authentication is driven by Authorization for Constrained Environments (ACE) <xref target="RFC9203"/>
        <xref target="I-D.ietf-ace-edhoc-oscore-profile"/>.</t>
    </section>
    <section anchor="objectives">
      <name>Objectives</name>
      <t>SVCB records are not meant and should not be used to exchange security contexts, so this eliminates
scenarios that use pre-shared keys with OSCORE. This leaves 2 base scenarios for OSCORE, which may
occur in combination, with scenarios using transport security, or alternative transport protocols:</t>
      <ul spacing="normal">
        <li>
          <t>DoC over OSCORE using EDHOC, and</t>
        </li>
        <li>
          <t>DoC over OSCORE using ACE.</t>
        </li>
      </ul>
      <t>We mostly need to answer the question for additional SvcParamKeys. <xref target="RFC9460"/> defines the keys
"mandatory", "alpn", "no-default-alpn", "port", "ipv4hint", and "ipv6hint".
Additionally, <xref target="I-D.ietf-core-dns-over-coap"/> defines "docpath" which carries the path for the DNS resource at the DoC
server as a CBOR sequence.</t>
      <t>Since "alpn" is needed for transport layer security, the type of object security (OSCORE using
EDHOC, OSCORE using ACE, OSCORE using EDHOC using ACE), needs to be conveyed in a different
SvcParamKey. The semantics and necessacity of the authenticator-domain-name field in <xref target="RFC9463"/> needs
to be evaluated in each case.</t>
      <t>When using ACE, more SvcParamKeys might be needed, such as the OAuth audience, the scope or the
authentication server URI.</t>
      <t>Defining these SvcParamKeys, including their value formats and spaces, as well as the behavior
definition for authenticator-domain-name field, shall be part of future work.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has no IANA considerations.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9460">
          <front>
            <title>Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records)</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <author fullname="M. Bishop" initials="M." surname="Bishop"/>
            <author fullname="E. Nygren" initials="E." surname="Nygren"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the "SVCB" ("Service Binding") and "HTTPS" DNS resource record (RR) types to facilitate the lookup of information needed to make connections to network services, such as for HTTP origins. SVCB records allow a service to be provided from multiple alternative endpoints, each with associated parameters (such as transport protocol configuration), and are extensible to support future uses (such as keys for encrypting the TLS ClientHello). They also enable aliasing of apex domains, which is not possible with CNAME. The HTTPS RR is a variation of SVCB for use with HTTP (see RFC 9110, "HTTP Semantics"). By providing more information to the client before it attempts to establish a connection, these records offer potential benefits to both performance and privacy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9460"/>
          <seriesInfo name="DOI" value="10.17487/RFC9460"/>
        </reference>
        <reference anchor="RFC9461">
          <front>
            <title>Service Binding Mapping for DNS Servers</title>
            <author fullname="B. Schwartz" initials="B." surname="Schwartz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>The SVCB DNS resource record type expresses a bound collection of endpoint metadata, for use when establishing a connection to a named service. DNS itself can be such a service, when the server is identified by a domain name. This document provides the SVCB mapping for named DNS servers, allowing them to indicate support for encrypted transport protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9461"/>
          <seriesInfo name="DOI" value="10.17487/RFC9461"/>
        </reference>
        <reference anchor="RFC9462">
          <front>
            <title>Discovery of Designated Resolvers</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="E. Kinnear" initials="E." surname="Kinnear"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document defines Discovery of Designated Resolvers (DDR), a set of mechanisms for DNS clients to use DNS records to discover a resolver's encrypted DNS configuration. An Encrypted DNS Resolver discovered in this manner is referred to as a "Designated Resolver". These mechanisms can be used to move from unencrypted DNS to encrypted DNS when only the IP address of a resolver is known. These mechanisms are designed to be limited to cases where Unencrypted DNS Resolvers and their Designated Resolvers are operated by the same entity or cooperating entities. It can also be used to discover support for encrypted DNS protocols when the name of an Encrypted DNS Resolver is known.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9462"/>
          <seriesInfo name="DOI" value="10.17487/RFC9462"/>
        </reference>
        <reference anchor="RFC9463">
          <front>
            <title>DHCP and Router Advertisement Options for the Discovery of Network-designated Resolvers (DNR)</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." role="editor" surname="Reddy.K"/>
            <author fullname="D. Wing" initials="D." surname="Wing"/>
            <author fullname="N. Cook" initials="N." surname="Cook"/>
            <author fullname="T. Jensen" initials="T." surname="Jensen"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies new DHCP and IPv6 Router Advertisement options to discover encrypted DNS resolvers (e.g., DNS over HTTPS, DNS over TLS, and DNS over QUIC). Particularly, it allows a host to learn an Authentication Domain Name together with a list of IP addresses and a set of service parameters to reach such encrypted DNS resolvers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9463"/>
          <seriesInfo name="DOI" value="10.17487/RFC9463"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl"/>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Stephan" initials="E." surname="Stephan"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC7858">
          <front>
            <title>Specification for DNS over Transport Layer Security (TLS)</title>
            <author fullname="Z. Hu" initials="Z." surname="Hu"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <author fullname="D. Wessels" initials="D." surname="Wessels"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="May" year="2016"/>
            <abstract>
              <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
              <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7858"/>
          <seriesInfo name="DOI" value="10.17487/RFC7858"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8484">
          <front>
            <title>DNS Queries over HTTPS (DoH)</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="P. McManus" initials="P." surname="McManus"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8484"/>
          <seriesInfo name="DOI" value="10.17487/RFC8484"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema"/>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson"/>
            <author fullname="A. Mankin" initials="A." surname="Mankin"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
        <reference anchor="RFC9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework. It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="I-D.amsuess-core-coap-over-gatt">
          <front>
            <title>CoAP over GATT (Bluetooth Low Energy Generic Attributes)</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <date day="18" month="March" year="2024"/>
            <abstract>
              <t>   Interaction from computers and cell phones to constrained devices is
   limited by the different network technologies used, and by the
   available APIs.  This document describes a transport for the
   Constrained Application Protocol (CoAP) that uses Bluetooth GATT
   (Generic Attribute Profile) and its use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-coap-over-gatt-06"/>
        </reference>
        <reference anchor="I-D.ietf-ace-edhoc-oscore-profile">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Ephemeral Diffie-Hellman Over COSE (EDHOC) for achieving
   mutual authentication between an ACE-OAuth Client and Resource
   Server, and it binds an authentication credential of the Client to an
   ACE-OAuth access token.  EDHOC also establishes an Object Security
   for Constrained RESTful Environments (OSCORE) Security Context, which
   is used to secure communications when accessing protected resources
   according to the authorization information indicated in the access
   token.  This profile can be used to delegate management of
   authorization information from a resource-constrained server to a
   trusted host with less severe limitations regarding processing power
   and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-edhoc-oscore-profile-04"/>
        </reference>
        <reference anchor="I-D.ietf-core-dns-over-coap">
          <front>
            <title>DNS over CoAP (DoC)</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Cenk Gündoğan" initials="C." surname="Gündoğan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="28" month="June" year="2024"/>
            <abstract>
              <t>   This document defines a protocol for sending DNS messages over the
   Constrained Application Protocol (CoAP).  These CoAP messages are
   protected by DTLS-Secured CoAP (CoAPS) or Object Security for
   Constrained RESTful Environments (OSCORE) to provide encrypted DNS
   message exchange for constrained devices in the Internet of Things
   (IoT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-07"/>
        </reference>
        <reference anchor="I-D.ietf-core-transport-indication">
          <front>
            <title>CoAP Transport Indication</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <date day="18" month="March" year="2024"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP, [RFC7252]) is available
   over different transports (UDP, DTLS, TCP, TLS, WebSockets), but
   lacks a way to unify these addresses.  This document provides
   terminology and provisions based on Web Linking [RFC8288] to express
   alternative transports available to a device, and to optimize
   exchanges using these.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-transport-indication-05"/>
        </reference>
        <reference anchor="I-D.lenders-core-coap-dtls-svcb">
          <front>
            <title>Service Binding and Parameter Specification for CoAP over (D)TLS</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="21" month="June" year="2024"/>
            <abstract>
              <t>   This document specifies the usage of Service Parameters as used in
   SVCB ("Service Binding") DNS resource records for the discovery of
   transport-layer-secured CoAP services.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-lenders-core-coap-dtls-svcb-00"/>
        </reference>
        <reference anchor="lwm2m" target="https://omaspecworks.org/white-paper-lightweight-m2m-1-1/">
          <front>
            <title>White Paper – Lightweight M2M 1.1</title>
            <author>
              <organization>OMA SpecWorks</organization>
            </author>
            <date year="2018" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 215?>

<section anchor="change-log">
      <name>Change Log</name>
      <section anchor="since-draft-lenders-core-dnr-01">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-01">draft-lenders-core-dnr-01</eref></name>
        <ul spacing="normal">
          <li>
            <t>Remove parts specified in <xref target="I-D.ietf-core-transport-indication"/></t>
          </li>
          <li>
            <t>Remove parts specified in <xref target="I-D.lenders-core-coap-dtls-svcb"/></t>
          </li>
          <li>
            <t>Remove solution sketches, set objectives to solve problem space</t>
          </li>
        </ul>
      </section>
      <section anchor="since-draft-lenders-core-dnr-00">
        <name>Since <eref target="https://datatracker.ietf.org/doc/html/draft-lenders-core-dnr-00">draft-lenders-core-dnr-00</eref></name>
        <ul spacing="normal">
          <li>
            <t>IANA has processed the "co" ALPN and it is now added to the registry</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
